Cyber News

/Cyber News

Windows Defender ATP is dead. Long live Microsoft Defender ATP

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: ABC News

Microsoft nudged the Windows brand further out of the limelight today by thwacking its anti-malware package with the rebranding stick. Behold, Microsoft Defender ATP.

The change is necessary, as Microsoft is unleashing its endpoint protection platform onto the hitherto virgin […]

By |March 22nd, 2019|Cyber News|

Silence of the WANs: FBI DDoS-for-hire greaseball takedowns slash web flood attacks ‘by 11%’

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

The FBI’s takedown of a group of prolific DDoS-for-hire websites has single-handedly helped to drop attack levels globally.

This is according to a report (registration required) from distributed-denial-of-service (DDoS) mitigation provider NexusGuard, who say that both the overall number of attacks and […]

By |March 22nd, 2019|Cyber News|

Ransomware drops the Lillehammer on Norsk Hydro: Aluminium giant forced into manual mode after systems scrambled

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Norwegian power and metals giant Norsk Hydro is battling an extensive ransomware outbreak on its computers.

The biz, one of the world’s biggest makers of aluminum with sites in 50 countries, said on Tuesday that file-scrambling malware had infected its […]

By |March 22nd, 2019|Cyber News|

Sorry, Linux. We know you want to be popular, but cyber-crooks are all about Microsoft for now

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Eight out of the ten most exploited vulnerabilities tracked by threat intelligence biz Recorded Future in 2018 targeted Microsoft products – though number two on its list was, surprise surprise, a Flash flaw.

The most exploited vuln in the firm’s […]

By |March 22nd, 2019|Cyber News|

PuTTY in your hands: SSH client gets patched after RSA key exchange memory vuln spotted

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Vulnerable SSH client PuTTY has received a pile of security patches, with its lead maintainer admitting to the The Register that one fixed a “‘game over’ level vulnerability”.

The fixes implemented on PuTTY over the weekend include new features plugging a plethora […]

By |March 19th, 2019|Cyber News|

Bad cup of Java leaves nasty taste in IBM Watson’s ‘AI’ mouth: Five security bugs to splat in analytics gear

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

IBM has issued a security alert over five vulnerabilities in its golden boy Watson analytics system.

Big Blue has issued an update today to clean up a series of security flaws in Watson that stem from the analytics system’s use […]

By |March 19th, 2019|Cyber News|

This headline is proudly brought to you by wired keyboards: Wireless Fujitsu model hacked

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: ABC NEWS

Updated A German security researcher has revealed that one model of Fujitsu wireless keyboard will accept unauthenticated input, despite the presence of AES-128 encryption.

Matthias Deeg discovered that the LX901 would respond to unencrypted but correctly formatted keystroke commands broadcast nearby. […]

By |March 19th, 2019|Cyber News|

DLL Hijacking attacks: What is it and how to stay protected?

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: cyware

DLL Hijacking attacks are broadly categorized into three types – DLL search order attack, DLL side-loading attack, and Phantom DLL Hijacking attack.
For DLL hijacking attack to be successful, it would require an attacker to trick victims to open […]

By |March 16th, 2019|Cyber News|

What was that P word? Ah. Privacy. Yes, we’ll think about privacy, says FCC mulling cellphone location data overhaul

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Analysis America’s comms regulator has finally pinky-promised to at least consider people’s privacy when it looks into how cellphone location data can be made more accurate.

On Friday, during a monthly meeting of commissioners, the FCC belatedly confirmed it would weigh up privacy […]

By |March 16th, 2019|Cyber News|

Army pushes cyber to the battlefield

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: FCW

Army Cyber Command plans to put cyber electromagnetic activities, or CEMA, teams on the battlefield and into every brigade combat team, division, corps and Army service component staff starting in June, Army Cyber Commander Lt. Gen. Stephen Fogarty said at […]

By |March 15th, 2019|Cyber News|